'

Insurance and Cybersecurity Strategy Go Together

Insurance and Cybersecurity Strategy Go Together

Cyber insurance is now the norm, according to new research. A survey from Sophos finds 91% of organizations report having coverage. An additional 8% said while they don’t currently have coverage, they plan to obtain it in the next year.  For those who purchased a cyber insurance policy in the last year, 95% say that the … Read more

Attackers use Cloudflare Tunnel to proxy into victim networks

Attackers use Cloudflare Tunnel to proxy into victim networks

Cloudflare Tunnel is a powerful tunneling solution that gives organizations a way to securely make internal applications and services accessible to external users while benefiting from the defenses and authentication policies enforced by the Cloudflare network. Like most tools that are meant to make infrastructure administration easier and more secure, they can also be abused … Read more

Identity-based security threats are growing rapidly: report

Identity-based security threats are growing rapidly: report

The most dangerous cybersecurity threat of the moment is an attacker with access to legitimate identity information for a given system, according to a report issued today by endpoint security and threat intelligence vendor CrowdStrike. According to the report, interactive intrusions (which the company defines as those in which an attacker is working actively to … Read more

North Korea hacked into Russian missile company: Report

North Korea hacked into Russian missile company: Report

Two North Korean hacker groups had access to the internal systems of a Russian missile and satellite developer NPO Mashinostoyeniya for five to six months in 2022, according to research by cybersecurity firm SentinelOne. Two separate instances of North Korea-related compromises were identified by SentinelLabs — the threat intelligence and malware analysis arm of SentinelOne … Read more

Kubernetes clusters under attack in hundreds of organizations

Kubernetes clusters under attack in hundreds of organizations

Kubernetes (K8s) clusters belonging to more than 350 organizations, open-source projects, and individuals have been detected as openly accessible and unprotected. More than half of those have been breached and had an active campaign with deployed malware/backdoors. That’s according to new findings from Aqua Security following a three-month-long investigation by its research team, Nautilus. Most … Read more

Code42’s Incydr identifies source and destination of source code

Code42’s Incydr identifies source and destination of source code

Insider risk management provider Code42 has launched an update to its Incydr data protection that can now detect the source and destination of proprietary source code movement and accurately detect exfiltration. This announcement follows on the September 2022 update when the company introduced the detection of Git push commands–the movement of source code to unsanctioned … Read more

Vectra AI unveils XDR platform with real-time attack signal intelligence

Vectra AI unveils XDR platform with real-time attack signal intelligence

Threat detection and response vendor Vectra AI has announced the release of the Vectra AI Platform – a new extended detection and response (XDR) offering that uses attack signal intelligence. The platform enables organizations to integrate Vectra AI’s public cloud, identity, SaaS, and network signal data with existing endpoint detection and response (EDR) to help … Read more

How LLMs are making red and blue teams more efficient

How LLMs are making red and blue teams more efficient

Security expert Evan Pena uses large language models (LLMs) almost daily “to confirm answers or come up with other ideas about how to investigate a vulnerability.” These natural language processing (NLP) tools that rely on artificial neural networks can generate text or code almost like humans, and they can also recognize patterns. Tapping into their … Read more